Networking Concepts
Networking Concepts
Concepts
IT Essentials v7.0
Chapter 5 - Sections & Objectives
5.1 Network Components and Types
• Explain components and types of computer networks.
• Describe the types of networks.
• Describe internet connection types.
5.2 Network Protocols, Standards, and Services
• Explain networking protocols, standards and services.
• Explain the purpose and characteristics of transport layer protocols.
• Explain the significance of application port numbers.
• Explain wireless protocols.
• Explain network services.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 5 - Sections & Objectives (Cont.)
5.3 Network Devices
• Explain the purpose of devices on a network.
• Explain basic network devices.
• Explain security devices.
• Explain other network devices.
5.4 Network Cables
• Explain the characteristics of network cables.
• Describe networking tools and their purpose.
• Explain the purpose and characteristics of common types of copper network cables and connectors.
• Explain the purpose and characteristics of common types of fiber network cables and connectors.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
5.1 Network Components
and Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Types of Networks
Network Icons
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Types of Networks
Network Topologies and Description
PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Types of Networks
Network Topologies and Description
WMN (wireless mesh network) – Connects
multiple wireless access points together to expand
the wireless network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Internet Connection Types
Brief History of Connection Technologies
Analog telephone access (dialup) – uses an
analog modem to call another modem.
ISDN (Integrated Services Digital Network) – more
bandwidth than dialup. Can carry voice, video, and
data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Internet Connection Types
DSL, Cable, and Fiber
DSL (digital subscriber line) – always on
technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on
the port that connects to a phone.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Internet Connection Types
Line of Sight Wireless Internet Service
Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Internet Connection Types
Satellite
Satellite – broadband technology for remote areas
• Uses a satellite dish
• Not a good solution for time-sensitive applications like gaming, Voice over Internet
Protocol (VoIP), and video conferencing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Internet Connection Types
Cellular
Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Internet Connection Types
Mobile Hotspot and Tethering
Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
5.2 Networking Protocols,
Standards, and Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Video Explanation – Transport Layer Protocols
Transport Layer Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Transport Layer Protocols
The TCP/IP Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Transport Layer Protocols
TCP
Three basic operations of reliability
• Numbering and tracking of data segments
• Acknowledgment of received data
• Retransmitting any unacknowledged data after a
period of time.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Transport Layer Protocols
UDP
Very little overhead or data checking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Transport Layer Protocols
Video Explanation – Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Application Port Numbers
Classify Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Application Port Numbers
Classify Application Port Numbers (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wireless Protocols
WLAN Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wireless Protocols
Bluetooth, NFC, and RFID
Bluetooth
• Up to 7 devices to create a PAN
• 802.15.1
• 2.4 to 2.485 GHz radio frequency range
RFID
• Passive or active tags used to identify items
• Passive – rely on RFID reader to activate and read
• Active – have a battery to broadcast the ID up to
100 meters
• 125 MHz to 960 MHz radio frequency range
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Protocols
Cellular Generations
1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.
4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s
LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.
5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Services
Video Explanation – Network Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Services
Client – Server Roles
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Services
DHCP Server
A DHCP server provides IP addressing information.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Services
DNS Server
A DNS server translates domain names such as cisco.com to an IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Services
Print Server
A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Services
File Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Services
Web Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Services
Mail Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Services
Proxy Server
Proxy servers act on behalf of a client, thus hiding the real internal host
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Services
Authentication Server
Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Services
Syslog Server
Syslog stores network messages sent by networking devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
5.3 Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Basic Network Devices
Video Explanation - Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Basic Network Devices
Network Interface Card
Todays computers have wired and/or wireless network capability.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Basic Network Devices
Repeaters, Bridges, and Hubs
Repeaters – Also called
extenders because they
regenerate the signal so it can be
sent further.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Basic Network Devices
Switches
Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Basic Network Devices
Wireless Access Points
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Basic Network Devices
Routers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Security Devices
Video Explanation – Security Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Security Devices
Firewalls
A firewall protects data and
devices connected to a network.
Firewalls use access control lists
(ACLs) which are rules used to
determine whether data is
permitted (allowed through) or
denied.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Security Devices
IDS and IPS
An Intrusion Detection System An Intrusion Prevention
(IDS) monitors traffic and is a System (IPS) actively monitors
passive system. traffic and takes action when
needed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Security Devices
UTMs
Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Security Devices
Endpoint Management Server
An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Other Network Devices
Legacy and Embedded Systems
A legacy system is a device on the network
no longer supported, but still in operation.
An embedded system is a device built into
something else such as an appliance.
Embedded microchips are contained in
legacy systems and embedded systems.
Legacy systems and embedded systems
could be a security risk.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Other Network Devices
Patch Panel
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Other Network Devices
Power over Ethernet and Ethernet over Power
Power over Ethernet (PoE) is a standard PoE injector
for providing power to devices such as
APs, cameras, or IP phones through a
cable.
Network cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Other Network Devices
Cloud-based Network Controller
A cloud-based network controller
is a remote device used to
manage network devices like
access points or switches.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
5.4 Network Cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Network Tools
Video Explanation – Network Cable Tools
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Network Tools
Network Tools and Descriptions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Network Tools
Network Tools and Descriptions (Cont.)
Multimeter
Cable Tester
Tone Generator
Wi-Fi analyzer
Loopback adapter –
used to check a port
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Copper Cables and Connectors
Cable Types
Cable types used in networking
• Twisted-pair
• Coaxial
• Fiber-optic
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Copper Cables and Connectors
Coaxial Cables
Coaxial cable
• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Copper Cables and Connectors
Twisted-Pair Cables
Twisted-pair cabling types
• Unshielded twisted-pair (UTP)
• Shielded twisted-pair (STP)
UTP
• Most common UTP cabling
• Four pairs of color-coded wires
• Prone to electromagnetic interference
(EMI) and radio frequency
interference (RFI)
STP
• Better protection against EMI and RFI
STP cabling
• More expensive and harder to install
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Copper Cables and Connectors
Twisted-Pair Category Ratings
Cat 5 UTP
Cat 5e UTP
Cat 6 UTP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Copper Cables and Connectors
Twisted-Pair Wire Schemes
T568A T568B
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Copper Cables and Connectors
Video Explanation – Build and Test a Network Cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Copper Cables and Connectors
Lab – Build and Test Network Cables
In this lab, you will build and test a straight-through Unshielded Twisted-Pair (UTP)
Ethernet network cable.
Note: With a straight-through cable, the color of wire used by pin 1 on one end is
the same color used by pin 1 on the other end, and similarly for the remaining
seven pins. The cable will be constructed using either TIA/EIA T568A or T568B
standards for Ethernet. This determines which color wire is to be used on each pin.
Straight-through cables are normally used to connect a host directly to a switch or
a wall plate in an office area.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Fiber Cables and Connectors
Fiber-Optic Cables
Fiber-Optic cables
• Use light to transmit signals
• Not affected by EMI or RFI
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Fiber Cables and Connectors
Types of Fiber Media
Single-mode fiber (SMF)
• Small core
SMF
• Uses laser technology to send one
beam of light
• Long distances
Multimode fiber (MMF)
• Larger core
• Uses LEDs to send light
• Light is injected at different angles MMF
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Fiber Cables and Connectors
Fiber-Optic Connectors
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
5.5 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Conclusion
Chapter 5: Network Concepts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68